2nd mode ­ xor PHR - Pure Human random ( or ROEE Random Oriented Enhanced Encryption) with a TIME set of instruction , and a computational temporary set of instructions to produce a real one time PAD when every time ,

Text will transform to a cipher the last will be different

3rd mode ­ xor WNS - White Noise Signal with a TIME set of instruction , and a computational temporary set of instructions to produce a real one time PAD when every time ,

Text will transform to a cipher the last will be different

4th Reconstructs file, levels and dimensions to a
this is a none mathematical with zero use of calculation algorithm - so no brute force , Rainbow Crack , or gpu cuda nvidia brute force crack can be applied on this technology . Sorry you have to find a new way to crack chaos theory for that.

We use 0% of any mathematical calculation algorithm ­ so we can perform any ware with unparalleled strength

Key Strength - 1million bit or more
Speed performance 400% faster Compeer to AES
MPU use - Mathematical Process Unit in CPU use 3% - 7% only
Overhead of the file from original 5% +/- (original+5%) +/-
A combination of mode 1 and 2 applied with a new variation of XOR - to perform the encrypted message

I'm no expert in cryptography, so if I'm missing something I definitely appreciate the correction from those of you who have more expertise than I, but a few points jump out at me:
1. If it is as strong as they say, I fail to see how it is possible that it is 400% faster than AES. Seems strength and overhead would be at odds.
2. I fail to see how this would not be suspectible to brute force attacks, which is nothing more than massive guessing. I don't see how the added variables will make guessing impossible. Harder, maybe. But any time someone must enter something to retrieve the data, how is it not possible for this to be guessed (and therefore brute forced)?
3. Why would anyone trust a product whose specs were advertised this poorly? The gibberish and poor grammar alone leads me to be skeptical (if not downright dismissive).

@RH: In their defense, they claim they intend to open source the algorithm... which is one step more serious than "my algortihm rocks and you can't see it!"
______________

The way I took the wording was that the technology would be open source for personal use, not that the algorith would be open. But, given how poorly written the piece was, I acknowledge I may likely be wrong.

Petréa: From the description and the name it's plain how HardGuard works: they unplug all cables, pour concrete over the machine and let it set. Perhaps they surround it with something metallic too, to stop wifi.

(They also claim it's not physically isolated, so perhaps they chain the machine to something as well.)

... actually, they have a patent, filed in 2001, number 6957286, which has plainly been gone over by someone competent in the English language in the four years between filing and issuance. It appears to describe two computers with a shared PSU, such that only one can be on at once, and shared memory: one communicates with the Internet, the other with the LAN. How this introduces anything other than catastrophic inconvenience remains unclear to me. It certainly doesn't secure you from, say, malware that writes itself to disk (these young 'uns who can't remember file viruses, or, er, trojans, droppers, email viruses...)

why use Pure Human Randomness? Why not Pure Simian Randomness or Pure Equine Randomness? Surely nonhumans exhibit much greater randomness than we do. Other than breaking out into Broadway songs on the subway, that is.

I read it again. Part 2 sounds suspiciously like a synchronous stream cypher. Using human randomness (i.e. mashing on the keyboard) to generate a "program" which temporarily generates a 1 time use pad.

That sounds to me like "generate a keystream and use [the new and improved] XOR to encrypt the message"!

I'm guessing the thought process is:
1) I don't understand the algorithm descriptions from other cryptography companies.
2) Other cryptography companies make money because of the algorithm descriptions.
3) If I produce an algorithm description that nobody can understand, I'll make lots of money!

The scary thing is, that isn't far from the truth. A detailed description of AES or Bluefish probably makes exactly as much sense as this does to someone with no training in math or crypto, and if that person is the one deciding which product to buy...

This sounds EXACTLY as if somebody went trough every "snake-oil warning signs" article Bruce has ever written, and then selected a dozen red flags pseudorandomly. (Remember to award extra points for the challenge ciphertext behind the link).

On a more detailed level, I suspect that the "4th" paragraph simply means "afterwards the file can be decrypted".

"Real one time PAD" is, as we all know, parsoleotongue for "synchronous stream cipher". I'll second RH's suggestion that the "human randomness" nonsense refers to gathering randomness from keyboard time or something such. It seems to me that they are they are using this randomness as the nonce to initialize the stream cipher.

"Step 1" seems to have something to do with permuting blocks of the plaintext before encrypting.

Spending much more time than this probably warrants, I took a look at the image they present thus:

"For cryptographic analysis we transform the encrypted file for a graphic randomness evaluation when 1 = black, 0 = white. This is a view of a regular file text file - not encrypted you can see the non randomness patterns all over the file - regular file link"

This image, ostensibly a plaintext text file displayed as a bitmap, is a jpeg file (!) but most pixels are close enough to black or white that the difference is probably due to jpeg artifacts.

Most of the upper half of the image looks very regular and has translational symmetry except for a small part of the pattern that varies from copy to copy. However it is a strange symmetry; the lattice bases are (351,0) and (51,1). Hard to reconcile with a "text file" assumption where the period of a pattern would surely be a multiple of 8 bits.

... oh. The pattern does not even match between the left and the right side of the image. So it's a complete fake. But why? I would find it much easier to slap a PBM header in front of a real text file with lots of redundancy, than to create a forgery as strangely skewed as this one.

The language seems like classic Chinglish of the form found in the instruction manuals for $10 radio controlled toys, or generated by BabelFish (maybe there's a correlation there? :-) so the language could be forgiven on those grounds.

However, after making allowance for translation, the alleged encryption algorithm is total smoke and mirrors.

The used algorithms seems to be a simple, well-known One-Time-Pad encryption. The random key which should have the same length as the plaintext is generated with different sources. If you find a secure way to transfer the key, the encryption is not breakable (which can be mathematical proofed). It is not described how the key is transferred. So this article brings nothing new. Perhaps it is only a satire.

Smells very much like "Jaws" or "Non-Elephant (NE2) Encryption." I'd love to pick through their referrer logs and see how many page visits were a result of the link from this page as compared to the rest of the interwebs as a whole.

Hey wow, these guys rock, like they're obviously 1337 {leet} . They've got a computer program that runs on a CPU using mathematical functions that doesn't do any maths ! They've computerised human randomness, something no-one else has ever done. AND they can decrypt scrambled text without doing any calculations. I'm going to buy that product.

It recalled me ZX-Spectrum program called "Plenum" ("plenum" meant meeting of communist party management).
The program just produced the text of any length you want in "newspeak" language. The effect? The same as communist leaders speeches: a lot of words, but no meaning at all.

I wrote to ask for details about their algorithm. After reminding me that their system doesn't use math, they said that it is patent pending and they can't give me anything more than what's on the website. Sigh...

I'm assuming their "white noise" is a PRBS losely based on RC4 but with a "one way" "shuffle" based on some logical implementation of "chaos theory" or two normaly non related linear algorithums such as ADD and XOR done in a similar way to SNOW.

They make a really good point, though... cryptanalysts are always attacking those mathematical calculation algorithms. Math is the achilles heel of modern cryptography! Cryptographers have been brainwashed by the "Big Math" educational system to think math is the answer to all their problems.

We need cryptography without math - preferably, developed by people who have not passed high-school calculus. This looks like an excellent start.

For non-link clickers, the comic shows a stick figure speaking at a conference. He says "My cryptosystem is like any feistel cipher, except in the S-Boxes we simply take the bitstring down, flip it, and reverse it." The caption reads "I've been barred from speaking at any major cryptography conferences ever since it became clear that all my algorithms were just thinly disguised missy elliot songs."

So they create a one-time pad that they then cannot send to the other party?

I have a better idea, instead of increasing the size by 5%, just 'encrypt' by taking the xor of the whole thing, just as unbreakable, just as useless, but only having to send one bit makes it that much better.

It looks like they permute/use a mapping in step 1 - block by block (which one/ones depends on the "randomly" generated key), XOR that with a "random key" seeded with a combination of temporal and random elements fed into the PRNG in step 2, then they transform in a way they understand so poorly that they don't realize that it's highly vulnerable to mathematical analysis in step 3. Oh, yes, and they can't count (further showing their mathematical prowess), so what they number as 2 and 3 are step 2, and their step 4 is step 3.

Finally, they show off a 2-d diagram of the lack of obvious patterns in their PRNG (which, unless step 3 is really bad, is pretty much all this shows).

"The content of privacyinside.com is for general information purposes only and does not constitute advice. privacyinside.com tries to provide content that is true and accurate as of the date of writing; however, we give no assurance or warranty regarding the accuracy, timeliness, or applicability of any of the contents."

Wow. That's almost too much BS for me to digest at once. How do these companies even score a few clients? I think I'm in the wrong business. Instead of real security, I should offer my own line of ineffective crypto algorithms. You avid doghouse readers would love that, right? Let's see if I can make it sound more realistic.

Tired of ineffective key lengths? Tired of worrying how long till someone breaks an algorithm and your secrets are spilled? Well, Crypto Casa Perro Inc. has the solution for you! It's called a Double-Streamed Block Cipher. It gives you the strength of the strongest block ciphers, without weaknesses associated with padding. And with a 256 to 512 bit key, brute force is a thing of the past. Here's how it works.

We start by taking your key and splitting it into two 128 or 256 bit keys. Then, we create a session- or file-specific key from the first master key and apply a fast and secure stream cipher, Salsa20, to the plaintext data. This lightening-fast cipher by itself defeats all known attacks. From there, we use the second master key to encrypt it again with Serpent block cipher in CBC mode. The stream cipher prevents padding from screwing up entropy, while CBC spreads randomness all over the data. The result? A totally freakin' unbreakable bunch of cipher text protected by a 512-bit random key! And did we say it's fast? That it uses SSE optimized x86 assember? And that it's been approved by the NSA for use in Type 4 encryption systems? Type 4! How many products can claim THAT rating!?

So, are you tired of breakable crypto products? Are you tired of a lack of layered security in encryption? Then why don't you start using the award-winning scheme mentioned on Bruce Schneier's blog! Our network and file-based encryption starts at only $199 a seat. And if you buy now, you get free integration with Outlook, PGP and OpenVPN. So, what are you waiting for!? Join the revolution!

I just looked at the holding company someone else posted. The closest thing they had to a real product was HardGuard, "inspected by Israeli DOD." Or whatever. You connect it to PC motherboard, and two sets of storage/network devices to it. One for "safe zone" and one for "unsafe/internet zone." It only provides power to one set at a time, preventing attacks. This is one of their main products.

To me, it's a weak ass red-black separation scheme. Far from immunity, it doesn't address BIOS, mobo- or processor-level attacks or how to prevent problems from the inevitable sharing of content. I still think *my* red-black scheme is much better: two net-tops, running OpenBSD or CentOS-based SELinux; KVM switch; easily plugged/unplugged audio and ethernet cross-over cables on clearly labeled ports; loads from LiveCD, recreated (updated) weekly; all shared content uses easily parsed formats and is scanned by AV software. You can buy their bullshit that's compromised by a Blue Pill attack, or you can build a setup like mine for under $800 with COTS components, OpenWRT or Soekris OpenBSD router included. ;) So, does anyone still want this awesome BalsaGuard (or whatever its called) product?

Excellent! Just send your money via Western Union to our account in the Cayman Island's. Please be sure to attach your credit card number and CCV so that we may verify your identity.* If your company chooses to purchase more and prefers wire transfer, be sure to send the money in increments under $10,000. This is for your protection. As always, thank you for doing business with Crypto Casa Perro!

* Your credit card will not be charged by us at any time, and your personal data is protected by our very own patent-pending 512-bit encryption technology.

>We need cryptography without math - preferably, >developed by people who have not passed high->school calculus. This looks like an excellent start.

Hmmm... Calculus, that was that course in high school that taught you how to use calculators right? I so ace'd that course. I better contact them with MY qualifications, I'm sure I can get a job! Hell, I can rock two TI-92 calculators at the same time!. :P

If anyone chokes on my sarcasm... I apoligize. I realize it is rather thick. Chew well before swallowing.

It reminds me of when I first started mountain biking, back in the 80s...back then, the magazines all had ads from Taiwanese manufacturers who were hoping to break into the market with their products...but which had curious uses of English in their slogans. One specific ad comes to mind here:

And it can be shown for quite a few complex operations on small number size it's a lot lot faster, and often uses less silicon space.

For instance back in the 1980's I developed various comms DSP solutions using 8bit micros (Z80) and lookup tables to do DFTs and similar. And less than ten years ago I implemented a two stage "digital IF" strip using little more than the equivalent of a handfull of fast TTL chips and a ROM chip for a specialised low bandwidth communiction system.

Even using more modern technology it would be doubtful if the same speed/gate count could be beaten by a conventional maths based CPU in either case.

I'd like to make a meta-argument for a bit. If they've filed a patent application, then we should be able to look up the application... I've tried 30 different combinations of the words on their website and their name and come up with nothing.

So I'm going to have to assume they're just messing with us and wasting our time. If they have an application in, they are protected assuming they get their patent (from a US law standpoint, they can disclose somewhat beforehand as long as they can prove they are the original source of the invention).

Interesting find, was fun to poke around their website. Everything considered, I'll stick with a different solution for a bit.

@iguacufalls: Pure Simian Randomness is out of the question. While one million bits of PSR is somewhat less than infinity, the complete works of Shakespeare could still be applied to break the encryption.

And it can be shown for quite a few complex operations on small number size it's a lot lot faster, and often uses less silicon space."

Hate to say it, but the prior art on this goes back a *long* way - the IBM 1620 'CADET" from 1959 comes to mind. Some wags say the CADET name stands for "Can't Add - Doesn't Even Try" because the initial machine didn't have any conventional hardware support for arithmetic operations - it was implemented using lookup tables in memory. When the 1620 Model II came out, they finally provided hardware add/subtract, but multiply was still done via table lookup.

"Hate to say it, but the prior art on this goes back a *long* way - the IBM 1620 'CADET" from 1959 comes to mind."

1959... I "Hate to say it, but" you sound like you are "longer in the tooth" than both Bruce and myself ;)

If you think about it even today all CPU's use lookup tables to do math to some extent (Pentium Bug definatly), after all that's all a microcoded state machine is.

I guess in reality a "matrix" lookup for maths is actually older even than mechanical computers ("Babage's mill" was designed to print out such tables for navigation).

And most children learn about such matrix lookup with their "times tables". Saddly though they nolonger get to see Trig or Log tables or one of the earliest mechanical maths aids "Napier's Bones".

Just last year I was talking to the teacher who was teaching my son primary maths and she had never heard of a slide rule. She was quite impressed when I showed her how it could be setup easily to do something akward like give a percentage score for a test with say 37 questions, and importantly once set took only a glance to do it for a whole class full of test papers.

Arguably the Enigma cipher machine, as where all the cipher machines before, were nothing other than automated "lookup tables", as where code books.

I guess it's just how you see the idea of Maths and Tables. All tables trade time / memory and related resources.

this site is obviously TERRORISTS trying to hide their messages because all the typos are pieces of a UNBREAKABLE ONE TIME PAD and if you read down the left side it says
am 1k which means they want to kill 1000 americans bruce don't post these obviously TERRORISTIC messages or the TERRORISTS WIN>

I worked with this group and was in charge of their technical development team in Haifa. The PHR encryption was initially based on human input (not a unique approach) from a file containing mouse movements stored on a PC. It was clear early on that 2D geometry is not a perfect source of randomness, not unlike using an electronic circuit for creating white noise as a seed to the key.

The algorithms were extremely fast for encryption/decryption with a reasonably low overhead of added bits to the content. Commercial viability and adoption were a key stumbling block for market introduction. However, as a cryptographer, I performed sufficient statistical analysis to indicate that it was good enough to prevent both a brute force attack or mathematical pattern analysis.

The use model was specifically designed to prevent man in the middle attacks and that is why the session key could change at different levels of granularity - all the way down to the packet level (bit of overkill). Shifting session keys prevent the middle man from creating the next key since you had to have access to the first key used. This approach has some serious deficiencies but was an excellent replacement for standard SSL methods.

Second - HardGuard

As some of the comments correctly analyzed, it was a 2 state operator so that when you switched between states (required a restart of the machine) any corrupted state of your environment was lost and replaced with a protected image. Bios and memory infections by virtue of the restart were lost and the bios was re instantiated with the original non-corrupted version.

The demonstrations to the Israeli DOD were based on keeping a CD copy of the operating system (uncorrupted image) in the machine so there is no way you can corrupt it.

While this was a somewhat simple way of solving the Trojan problem, it meant that injecting a virus that affected files, would still be on the hard drive giving it the opportunity for damaging other stored data. While the OS was always clean from a restart using the CD, data could be infected on the hard drive.

I think they solved this issue but I was no longer engaged with them at that point.

Language - Yes, the English text is somewhat mangled but does not reflect their competency in their field of discipline. You should read some of the stuff from software companies in India - much worse and for them English is the only commercial language used. So, don't be so hard on them about this issue...probably they need better web design contractors.

Most of the scientific work was developed by Royi Cohen, a smart young man whom I enjoyed for his sincerity, inventiveness and honesty.

2d-Barcodes - While I did not work with Privacy Inside (now Cryptocodex) on this application, I did a preliminary analysis of their merging barcodes with PHR and found this approach a strong audit tool for counterfeit commercial goods (electronics, apparel, accessories). With the new smartphones, you could use an online camera to capture the image and interrogate a server usind cellular data services. This method is already implemented for 2D barcodes on coupons that can be scanned at a point of sale laser scanner.

Their application is easy and practical to implement, unlike other methods that create embedded codes in the material or paints used. There are at least Israel vendors who are doing physical surface encoding today. One vendor uses a chemical signature method that can be used to track fuels to see if they are from a source that pays a tax (gasoline stations) as opposed to one where no tax is applied (for example, gasoline supplied to farmers).

The encrypted barcode is an excellent add on to document protection, especially those produced by Word and Adobe. I wish them well.